Department of Mathematics and Computer Science

Research Output 1937 2020

Filter
Other contribution
2019

Decisional second-preimage resistance: when does SPR imply PRE?

Bernstein, D. J. & Hülsing, A. T., 2019, 36 p.

Research output: Other contributionAcademic

Hash functions

Tighter proofs of CCA security in the quantum random oracle model

Bindel, N., Hamburg, M., Hülsing, A. & Persichetti, E., 2019, 29 p.

Research output: Other contributionAcademic

Random Oracle Model
Rejection
Lemma
Transform
Public Key Encryption
2018

XMSS: extended hash-based signatures. RFC 8391

Hülsing, A. T., Butin, D., Gazdag, S-L., Rijneveld, J. & Mohaisen, A., 2018

Research output: Other contributionProfessional

Open Access
2017
33 Downloads (Pure)

A dual shared stack for FSLM in Erika Enterprise

Balasubramanian, S. M. N., Afshar, S., Gai, P., Behnam, M. & Bril, R. J., 2017, 2 p.

Research output: Other contributionAcademic

File
Industry

Classic McEliece

Bernstein, D. J., Chou, T., Lange, T., von Maurich, I., Misoczki, R., Niederhagen, R., Persichetti, E., Peters, C., Schwabe, P., Sendrier, N., Szefer, J. & Wang, W., 2017

Research output: Other contributionAcademic

Open Access
Hash functions
ROM
Quantum computers
Binary codes
Random errors

Monte Carlo approach to compute the success probability of sending objects to the Moon

Sadeghi, J., Rocchetta, R., George-Williams, H. & de angelis, M., 30 Apr 2017, 27 p.

Research output: Other contributionOther research output

Open Access
Moon
Landing
Earth (planet)
Food supply
Planets

MQDSS - Submission to the NIST post-quantum cryptography project

Chen, M-S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2017

Research output: Other contributionAcademic

Open Access

NTRU-HRSS-KEM - Submission to the NIST post-quantum cryptography project

Hülsing, A., Rijneveld, J., Schanck, J. M. & Schwabe, P., 2017

Research output: Other contributionAcademic

Open Access

NTRU Prime

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Vredendaal, C. V., 2017

Research output: Other contributionAcademic

Cryptography

SPHINCS+ - Submission to the NIST post-quantum cryptography project

Bernstein, D. J., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S-L., Hülsing, A., Kampanakis, P., Kölbl, S., Lange, T., Lauridsen, M. M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J. & Schwabe, P., 2017

Research output: Other contributionAcademic

Open Access
14 Downloads (Pure)

To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures

Pessl, P., Bruinderink, L. G. & Yarom, Y., 2017, 13 p. IACR.

Research output: Other contributionAcademic

Open Access
File
2016
2 Downloads (Pure)

A trivial debiasing scheme for helper data systems

Skoric, B., 2016, 10 p.

Research output: Other contributionOther research output

data systems
entropy
condensing
coding

Authenticated communication from quantum readout of PUFs

Skoric, B., Pinkse, P. W. H. & Mosk, A. P., 2016, 6 p.

Research output: Other contributionOther research output

BPI Challenge 2016: Clicks Logged In

Dees, M. & Dongen, B. F. V., 2016, UWV.

Research output: Other contributionOther research output

BPI Challenge 2016: Clicks NOT Logged In

Dees, M. & Dongen, B. F. V., 2016, UWV.

Research output: Other contributionOther research output

BPI Challenge 2016: Complaints

Dees, M. & Dongen, B. F. V., 2016, UWV.

Research output: Other contributionOther research output

BPI Challenge 2016: Questions

Dees, M. & Dongen, B. F. V., 2016, UWV.

Research output: Other contributionOther research output

BPI Challenge 2016: Werkmap Messages

Dees, M. & Dongen, B. F. V., 2016, UWV.

Research output: Other contributionOther research output

3 Downloads (Pure)

Fundamentals of duct acoustics: notes of course "Progress in Simulation, Control and Reduction of Ventilation Noise", November 16-18, 2015.

Rienstra, S. W., 2016, 52 p. Brussel : Von Karman Institute for Fluid Dynamics.

Research output: Other contributionOther research output

108 Downloads (Pure)
Open Access
File
Labels

Optimized quantization in zero leakage helper data systems

Stanko, T., Fitria Nur Andini, F. & Skoric, B., 2016

Research output: Other contributionOther research output

Error correction
Redundancy

Quantum key recycling with eight-state encoding: (the quantum one time pad is more interesting than we thought)

Skoric, B. & de Vries, M., 2016, 26 p.

Research output: Other contributionOther research output

2008

Membership editorial board - Quality and reliability engineering international

Lu, Y. & Xie, M., 2008, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

2006

Evaluation of white matter fiber clustering methods for diffusion tensor imaging

Vilanova, A., Moberts, B., Wijk, J. J. V., Op denBuijs, J., Roos, F. G. & Pul, C. V., 2006, 1 p.

Research output: Other contributionAcademic

Diffusion tensor imaging
Fibers
Clustering algorithms
Seed
Tensors
24 Downloads (Pure)

Wiskunde-dictaten 1956-1982

Graaf, de, J., 2006, Eindhoven : Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

2001

On semiflocks, eggs and ovoids of Q(4,q)

Lavrauw, M., 2001, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

On two-intersection sets

Blokhuis, A. & Lavrauw, M., 2001, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

There are only finitely many distance-regular graphs of valency five, six, or seven

Brouwer, A. E. & Koolen, J. H., 2001, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

2000

Calculation is the Name of the Game

Hoogerwoord, R. R., 2000, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

Cryptographic Evaluation of the Voting Systems Choose, I-Vote and AOZ

Schoenmakers, L. A. M., 2000, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

Formality Works

Hoogerwoord, R. R., 2000, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

Functional-Program Inversion, with an application to Parser Construction

Hoogerwoord, R. R., 2000, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

Mathematical Induction, Well-Foundedness, and the Axiom of Choice

Hoogerwoord, R. R., 2000, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

Operator Folding and its Applications1

Hoogerwoord, R. R., 2000, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

OSS Interconncetion Gateways: validation and testing stategies, volume 6: security

Vink, de, E. P., 2000, Heidelberg : Heidelberg.

Research output: Other contributionOther research output

Programming with Infinite Lists: an example

Hoogerwoord, R. R., 2000, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

Security Evaluation of the Gordian Algorithm

Schoenmakers, L. A. M. & Roelse, P. L. A., 2000, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

Take and Drop in a Nutshell

Hoogerwoord, R. R., 2000, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

The Tail Recursion Theorem for Lists

Hoogerwoord, R. R., 2000, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

1999

AvG180 A little process algebra, for my record

Gasteren, van, A. J. M., 1999, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

AvG181 Specificatie-oefeningen

Gasteren, van, A. J. M., 1999, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

Density and hazard estimation in censored regression models

Van Keilegom, I. & Veraverbeke, N., 1999, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

Hazard rate estimation in nonparametric regression with censored data

Van Keilegom, I. & Veraverbeke, N., 1999, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

ICT-Zakboekje

Aalst, van der, W. M. P., 1999, Arnhem : PBNA.

Research output: Other contributionOther research output

Nonparametric ANCOVA methods for heteroscedastic nonparametric regression models

Van Keilegom, I. & Akritas, M. G., 1999, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

rh235: Leslie Lamport's Logical Clocks: a tutorial

Hoogerwoord, R. R., 1999, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

rh249: Laten we het niet erger maken

Hoogerwoord, R. R., 1999, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

rh253: Mathematical Induction and Well-Foundedness

Hoogerwoord, R. R., 1999, Technische Universiteit Eindhoven.

Research output: Other contributionOther research output

Robust benchmark dose determination based on profile score methods

Claeskens, G. A. M., Aerts, M., Molenberghs, G. & Ryan, L., 1999, Helsinki : International Statistical Institute.

Research output: Other contributionOther research output

Some theory for penalized spline additive models

Aerts, M., Claeskens, G. A. M. & Wand, M. P., 1999, Helsinki : International Statistical Institute.

Research output: Other contributionOther research output